Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yudi Satria Gondokaryono is active.

Publication


Featured researches published by Yudi Satria Gondokaryono.


international conference on electrical engineering and informatics | 2009

The simulation of static load balancing algorithms

Hendra Rahmawan; Yudi Satria Gondokaryono

In this research, four static load balancing algorithms: Round Robin, Randomized, Central Manager, and Threshold, are simulated and they performances are compared. The simulation is performed using discrete event simulator. Load indices used for Central Manager and Threshold algorithm are CPU, memory, and hard disk I/O. The simulation of the four algorithms is done against three types of programs that have different load dominance. The three programs have different dominance in CPU instruction load, memory access, and hard disk I/O. The simulation results analysis shows that, the choosing of static load balancing algorithms has significant influence against system performance. Based on execution time, it can be concluded that, Central Manager algorithm that use CPU or hard disk I/O as they load indices, is the best static load balancing algorithm that gives fastest execution time. Whereas based on load distribution in the system, it can be concluded that, Central Manager and Threshold algorithm that use memory, CPU, or hard disk I/O as they load indices, are two best static load balancing algorithm that able to balance loads well.


Archive | 2011

Analyzing the Indicators and Requirements in Main Components Of Enterprise Architecture Methodology Development Using Grounded Theory in Qualitative Methods

Jaka Sembiring; Edi Triono Nuryatno; Yudi Satria Gondokaryono

Many organizations apply EA as part of their IT management and planning activities. From their perspective, it would seem that EA should play an important role in strategic planning, alignment and prioritization. Today we know the four top EA frameworks, which are often used in preparing the EA. The four top EA frameworks are the Zachman, Gartner, TOGAF and FEA. But in reality we have to be sure whether the four top EA frameworks can be directly adopted into organizations. To answer these questions, we conducted a study of the basic functions and staging in the development of EA in order to obtain certainty on the indicators and requirements in main components of EA methodology development.In this study we will use qualitative methods with a strategy of inquiry using grounded theory. This process involves using multiple stages of data collection and refinements and finding interrelationship of categories of information. Two primary characteristics of this method are the constant comparison of data with emerging categories and theoretical sampling of different perspective to maximize the similarities and the differences of information.


international conference on cloud computing | 2012

Cloud computing reference model: The modelling of service availability based on application profile and resource allocation

Adityas Widjajarto; Suhono Harso Supangkat; Yudi Satria Gondokaryono; Ary Setijadi Prihatmanto

Under unconsolidated resources, cloud computing providers have to allocate some resources to fullfil client request based on the on-demand mode. Using the applications profile, Infrastructure-as-a-Service model can be developed. Basically, Infrastructure-as-a-Service model provides resources in the form of computation power (CPU-hours unit), storage (gigabytes unit), network bandwidth (Internet data transfer, GB per day unit), and electrical power (kWh). From service availability point of view, reference model is previously developed as a backup framework. In this research, the development of cloud computing reference model for on-demand services is based on both application characteristics and resources availability. The objective of development model in this research is to decrease idle resources.


frontiers of information technology | 2016

Mutual authentication in securing mobile payment system using encrypted QR code based on Public Key Infrastructure

Ariana Tulus Purnomo; Yudi Satria Gondokaryono; Chang-Soo Kim

Payment transaction using mobile phone has some possibilities of risk. Mobile devices still not secure and need more attention in the security area. In this paper, we propose mutual authentication technique between client and merchant using encrypted QR Code. QR Code has been widely used in recent technology. Secure transmission of data transaction can be accommodated using encrypted QR Code. QR Code can store more information than a traditional barcode. This security system maintained by Public Key Infrastructure (PKI) will ensure an additional layer of security.


international conference on information technology systems and innovation | 2014

Smart grid secure data transmission for high voltage grid

Mukti Winanda; Ardianto Satriawan; Yudi Satria Gondokaryono

Smart grid is a new breakthrough in terms of transmission and distribution power lines from power plants. All communication data transmission that occurs on the smart grid is done digitally, making it easier for operators to control and monitor every transmission data as well as monitor any equipment connected to the smart grid. However, the use of digital technologies makes the security becomes an important aspect of any communication that occurs in a smart grid system. The security will focus on the delivery and transmission of data transmitted from the power plant to any existing substations, as well as data communication that occurs between substations and also inside the substation. Data communications between substations is a very critical thing, so need for security mechanisms are applied to that communication. The addition of security against any communication will affect the performance of the data transmission in smart grid. The implementation of IPSec is used as security protocols are applied to each gateway that resides on each substations. This is done so that any communication between substations can be done safely. It is also necessary that the exact configuration of the encryption and authentication algorithms used in the implementation of IPSec protocol could potentially provide the best performance. Implementation substation network design on smart grid and security of data transmission is done by simulation using OPNET modeler 14.5.


ieee international conference on condition monitoring and diagnosis | 2012

Development of Transformer Monitoring System for Condition-Based Maintenance in PT. PLN Java-Bali Transmission and Load Dispatch Center

B. Pharmasetiawan; Hakim Ad Dairi; Yudi Satria Gondokaryono; Anita Pharmatrisanti; Edy Subagja; Bambang Cahyono

Power transformer is one of the most important and expensive equipments in Electrical Utility Company. PT PLN Java-Bali Transmission and Load Dispatch Center (PT PLN P3B Jawa-Bali) started to renew the maintenance program for its equipments including power transformers since 2006 in order to reduce transformer failure. The maintenance program which is based on Condition-Based Maintenance (CBM) has several activities. This paper will report one of these activities which is Transformer Monitoring System (TMS) in Java-Bali. Based on their individual function, the architecture of the monitoring system is divided into two parts, which are the Field sub-system and the Data Collecting Center sub-system. The purpose of the monitoring system is to collect transformer parameters based on an on-line measurement and to indicate tranformers premature loss. The statistical model and physical model have been used to indicate transformer condition index and transformers component condition respectively. Clustering strategy consideration was made to accommodate the various transformer manufacturers and the various types of transformers owned by PT PLN.


frontiers of information technology | 2016

Fast non-random chaff point generator for fuzzy vault biometric cryptosystems

Annisa Istiqomah Arrahmah; Yudi Satria Gondokaryono; Kyung-Hyune Rhee

Fuzzy vault is one of the biometric cryptosystems that allows the cryptographic keys to be securely maintained depending on the biometric information. In last years, a development of this method is approached significantly to enhance the security level, reduce the flaws and accelerate the computational process. One of the important function in the fuzzy vault system is chaff point generator. Chaff points are produced to disguise the genuine points using a random or nonrandom generator. This function has a trade-off, it can become security flaws or compute-intensive process. In this paper, we propose a method to make a non-random chaff point generator for fuzzy vault by combining idea between M.T. Nguyens algorithm and M.K. Hanis algorithm. In our experiment, we use fingerprint minutiae as a biometric information in the proposed biometric cryptosystems. With this method, the fuzzy vault not only computationally fast but also secure.


2016 6th International Conference on Electronics Information and Emergency Communication (ICEIEC) | 2016

HPC resources scheduling simulation using SimDAG

Arief Zulianto; Kuspriyanto; Yudi Satria Gondokaryono

Grid scheduling has been intensively studied, tools that enable the simulation of grids have been developed. These simulation tools have the common objective of developing and evaluating scheduling algorithms for grids. By using the simulation tools, knowledge about the behaviour of scheduling system will be more easily understood. However, knowledge about the method and how to use the tools is required. This paper will describe the use of SimDAG to simulate MinMin, MaxMin and HEFT scheduling algorithms in HPC.


international conference on information technology systems and innovation | 2015

Designing a Rice Logistics Distribution System in West Java

Muhammad Rizkarmen; Rolan Mauludy Dahlan; Yudi Satria Gondokaryono

Rice is still a major source of carbohydrates in the food consumption pattern in Indonesia. Availability of rice in Indonesia faces the challenges on the production side due to the production cycle following the water cycle while consumption remained relatively unchanged by time. This study aims to map the structure of production, consumption, and distribution in West Java and built a computational platform that can provide strategic decision in rice distribution. The decision covers: calculate the potential supply and demand in each Bulogs warehouse, determine which warehouse that need to be extended, determine the amount of import needs, and determine the optimum rice distribution route between warehouses.


International Conference on ICT for Smart Society | 2013

Implementation of online information and multimedia access to improve Internet literacy teacher

Yudi Satria Gondokaryono; Bryan Yonathan; Yoanes Bandung

The key issue of this paper is how to build a knowledge society and knowledge economy for rural areas through the utilization of information and communication technology (ICT). The purpose is to apply and implement the product service system (PSS) information and multimedia access for learning communities in West Java, especially in rural or village. Our hope that the public welfare and quality of life can be improved.

Collaboration


Dive into the Yudi Satria Gondokaryono's collaboration.

Top Co-Authors

Avatar

Ariana Tulus Purnomo

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Chang-Soo Kim

Pukyong National University

View shared research outputs
Top Co-Authors

Avatar

Yoanes Bandung

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Bryan Yonathan

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Rina Mardiati

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Sarwono Sutikno

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Kyung-Hyune Rhee

Pukyong National University

View shared research outputs
Top Co-Authors

Avatar

Ilkyeun Ra

University of Colorado Denver

View shared research outputs
Researchain Logo
Decentralizing Knowledge